Sciweavers

412 search results - page 34 / 83
» Semantic Representation of Negation Using Focus Detection
Sort
View
ESAS
2004
Springer
15 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
DATAMINE
2008
89views more  DATAMINE 2008»
14 years 9 months ago
Mining conjunctive sequential patterns
Abstract. In this paper we aim at extending the non-derivable condensed representation in frequent itemset mining to sequential pattern mining. We start by showing a negative examp...
Chedy Raïssi, Toon Calders, Pascal Poncelet
JDCTA
2010
203views more  JDCTA 2010»
14 years 4 months ago
Preprocessing Method for NaXi Pictographs Character Recognition Using Wavelet Transform
Preprocessing, a major component of Character Recognition System, has direct effect on the recognition system by its performance. Using wavelet transform, this paper mainly focuse...
Hai Guo, Jing-ying Zhao, Xiao-niu Li
GLOBECOM
2010
IEEE
14 years 7 months ago
Credit-Based Mechanism Protecting Multi-Hop Wireless Networks from Rational and Irrational Packet Drop
The existing credit-based mechanisms mainly focus on stimulating the rational packet droppers to relay other nodes' packets, but they cannot identify the irrational packet dro...
Mohamed Elsalih Mahmoud, Xuemin Shen
MOBIHOC
2005
ACM
15 years 9 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha